<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SMTP attachment analysis on Firepower in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043084#M1015171</link>
    <description>&lt;P&gt;I have set up a lab with a fully licensed&amp;nbsp;ASA+FP device in front of a TLS enabled SMTP server. Created a rule to decrypt SSL traffic using its own certificate+key, to a set of TCP ports to this SMTP server IP address. I also turned on file detection and SSL decryption on the ACL policies applied in the device. IPS/NAP policies are the default Balanced ones.&lt;/P&gt;
&lt;P&gt;However when I email the&amp;nbsp;EICAR file to an account on this server, I have no records on FMC that this file went thru. I was expecting, as FMC records a malware entry when I download the EICAR file from a web server, to have an entry recorded for the SMTP session as well.&lt;/P&gt;
&lt;P&gt;Anyone could provide me more info on this?&lt;/P&gt;
&lt;P&gt;Last but not least, I fully understand the performance limitations and impact of such scenario.&lt;/P&gt;
&lt;P&gt;Appreciated for any hints/guidance.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 13:26:40 GMT</pubDate>
    <dc:creator>HQuest</dc:creator>
    <dc:date>2019-03-12T13:26:40Z</dc:date>
    <item>
      <title>SMTP attachment analysis on Firepower</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043084#M1015171</link>
      <description>&lt;P&gt;I have set up a lab with a fully licensed&amp;nbsp;ASA+FP device in front of a TLS enabled SMTP server. Created a rule to decrypt SSL traffic using its own certificate+key, to a set of TCP ports to this SMTP server IP address. I also turned on file detection and SSL decryption on the ACL policies applied in the device. IPS/NAP policies are the default Balanced ones.&lt;/P&gt;
&lt;P&gt;However when I email the&amp;nbsp;EICAR file to an account on this server, I have no records on FMC that this file went thru. I was expecting, as FMC records a malware entry when I download the EICAR file from a web server, to have an entry recorded for the SMTP session as well.&lt;/P&gt;
&lt;P&gt;Anyone could provide me more info on this?&lt;/P&gt;
&lt;P&gt;Last but not least, I fully understand the performance limitations and impact of such scenario.&lt;/P&gt;
&lt;P&gt;Appreciated for any hints/guidance.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043084#M1015171</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2019-03-12T13:26:40Z</dc:date>
    </item>
    <item>
      <title>Are you seeing a connection</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043085#M1015172</link>
      <description>&lt;P&gt;Are you seeing a connection event at all? If not, make sure the routing is via the ASA and that the ASA class-map / policy-map redirects the traffic to the module.&lt;/P&gt;
&lt;P&gt;If so, then what does it show?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 08:58:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043085#M1015172</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-07-03T08:58:41Z</dc:date>
    </item>
    <item>
      <title>I do see all the connection</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043086#M1015173</link>
      <description>&lt;P&gt;I do see all the connection events being logged whenever the remote server talks to my internal SMTP server, so routing does not seems to be an issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I can see on the connection events basically a confirmation that all my rules are applied and matched, however the mail client still receives the eicar file.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;[Edit] attached a picture instead of a clunky table - easier on the eyes.&lt;/P&gt;
&lt;P&gt;[Edit 2] seems I forgot a few keywords on my OP. The file inspection do record a malware entry found during the&amp;nbsp;HTTP transfer of the eicar file, but not from a SMTP attachment. This makes a world of a difference from my original question. Updating it accordingly to be clear should anyone else browses it.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 11:48:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043086#M1015173</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2017-07-03T11:48:02Z</dc:date>
    </item>
    <item>
      <title>I see the logic and would</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043087#M1015174</link>
      <description>&lt;P&gt;I see the logic and would think it should all do as you originally intended.&lt;/P&gt;
&lt;P&gt;This is a good question and I have sometimes wondered about the distinction myself - i.e., "If I have AMP for Networks on the FirePOWER device or module then why do I also need AMP licensing on an ESA?".&lt;/P&gt;
&lt;P&gt;I'm moving this thread into the FirePOWER forum in hopes that one of the Cisco TAC staff who monitor that forum will chime in with an answer.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 13:27:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043087#M1015174</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-07-03T13:27:44Z</dc:date>
    </item>
    <item>
      <title>Hi Alexandre,</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043088#M1015175</link>
      <description>&lt;P&gt;Hi Alexandre,&lt;/P&gt;
&lt;P&gt;I've no idea why you your sensor is not intercepting the malware, but if were you I try to make things simple: have you tried to send the same attachement from a non SSL enabled mail server, in order to exclude decryption from the equation?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 15:06:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043088#M1015175</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2017-07-03T15:06:41Z</dc:date>
    </item>
    <item>
      <title>Hello Massimo.</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043089#M1015176</link>
      <description>&lt;P&gt;Hello Massimo.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Yes, I did. It does not change anything. See below for a plain SMTP session (no STARTTLS) output. And yet, FMC has the packets listed in the Connection Events, but no Malware has been recorded by the Files dashboard.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3 10:36:30.00 INFO: Opening connection to (mx.example.com) port (25)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;220 *****************************************************&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;ehlo me.com&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:30.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250-mx.example.com Hello netwin.netwinsite.com [198.1.73.205], pleased to meet you&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250-ENHANCEDSTATUSCODES&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250-PIPELINING&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250-8BITMIME&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250-SIZE&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250-DSN&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250-ETRN&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250-AUTH DIGEST-MD5 CRAM-MD5&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250-STARTTLS&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250-XXXXXXXXA&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250 XXXB&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;mail from:&amp;lt;hquest@example.com&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:30.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250 2.1.0 &amp;lt;hquest@example.com&amp;gt;... Sender ok&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:30.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;rcpt to:&amp;lt;hquest@example.com&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:31.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250 2.1.5 &amp;lt;hquest@example.com&amp;gt;... Recipient ok&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:31.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;DATA&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:31.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;354 Enter mail, end with "." on a line by itself&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:31.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;From: hquest@example.com&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:31.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;To: hquest@example.com&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:31.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;x-test-header: Test message from http://reputation-email.com&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:31.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;Mime-Version: 1.0&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:31.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;Content-Type: application/octet-stream;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:31.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;Content-Disposition: attachment; filename="eicar.com";&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:31.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;Subject: Test message from reputation-email.com - EICAR test virus attached&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:31.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:31.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:31.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:31.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;250 2.0.0 v63FaU5D098202 Message accepted for delivery&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;3 10:36:31.00 --&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="green"&gt;quit&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;SPAN&gt;3 10:36:31.00 &amp;lt;--&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;FONT color="blue"&gt;221 2.0.0 mx.example.com closing connection&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 15:56:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043089#M1015176</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2017-07-03T15:56:16Z</dc:date>
    </item>
    <item>
      <title>Can you see the file transfer</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043090#M1015177</link>
      <description>&lt;P&gt;Can you see the file transfer logged in Analysis/files/file events/table view?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 16:09:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043090#M1015177</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2017-07-03T16:09:38Z</dc:date>
    </item>
    <item>
      <title>Nope. I have a .jar file but</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043091#M1015178</link>
      <description>&lt;P&gt;Nope. I have a .jar file but not the SMTP attachments.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 16:13:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043091#M1015178</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2017-07-03T16:13:53Z</dc:date>
    </item>
    <item>
      <title>Sorry if I ask, but are sure</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043092#M1015179</link>
      <description>&lt;P&gt;Sorry if I ask, but are sure that smtp protocol is enabled in your file policy for the right direction?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 16:20:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043092#M1015179</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2017-07-03T16:20:07Z</dc:date>
    </item>
    <item>
      <title>I think so - see the</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043093#M1015180</link>
      <description>&lt;P&gt;I think so - see the Inspection policy and file inspection screen capture attachments. More specifically, SMTP is listed under the detailed rule.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 16:37:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043093#M1015180</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2017-07-03T16:37:33Z</dc:date>
    </item>
    <item>
      <title>That's access policy, can you</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043094#M1015181</link>
      <description>&lt;P&gt;That's access policy, can you check file policy also?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 16:41:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043094#M1015181</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2017-07-03T16:41:57Z</dc:date>
    </item>
    <item>
      <title>Sorry, I missed file policy</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043095#M1015182</link>
      <description>&lt;P&gt;Sorry, I missed file policy in your previous post.&lt;/P&gt;
&lt;P&gt;If file policy is the same applied to http traffic afaik it should work, have you considered to open a tac case?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 16:46:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043095#M1015182</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2017-07-03T16:46:38Z</dc:date>
    </item>
    <item>
      <title>What about rule 2?</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043096#M1015183</link>
      <description>&lt;P&gt;What about rule 2?&lt;/P&gt;
&lt;P&gt;That rule seems to match any kind of traffic, that way rules 3 and 4 should never been matched.&lt;/P&gt;
&lt;P&gt;Have tried to disable it?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 16:53:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043096#M1015183</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2017-07-03T16:53:47Z</dc:date>
    </item>
    <item>
      <title>Rule #2 is a monitor; it logs</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043097#M1015184</link>
      <description>&lt;P&gt;Rule #2 is a monitor; it logs all traffic and moves down for next rules to be processed. Rule #3 is HTTP/HTTPS traffic only, so SMTP moves down to the next rule. Earlier I've posted another screen capture showing both monitor and mail inspection rules being matched, so I'm pretty certain the rules are being parsed and processed, however the attachment is not being detected/understood.&lt;/P&gt;
&lt;P&gt;I will have a TAC case submit and will update later what the outcome is. Thanks anyway for your suggestions.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 19:11:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043097#M1015184</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2017-07-03T19:11:44Z</dc:date>
    </item>
    <item>
      <title>Well, so far good news and</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043098#M1015185</link>
      <description>&lt;P&gt;Well, so far good news and bad news.&lt;/P&gt;
&lt;P&gt;The good news is, my rules are spot on for what I need.&lt;/P&gt;
&lt;P&gt;The bad news is, TAC needs to research why FP is not finding the malware on&amp;nbsp;SMTP traffic. And IMAP traffic. And POP3. Encrypted or not...&lt;/P&gt;
&lt;P&gt;More to come.&lt;/P&gt;
&lt;P&gt;Thanks again for all the suggestions.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 21:36:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043098#M1015185</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2017-07-03T21:36:02Z</dc:date>
    </item>
    <item>
      <title>It sounds like a bug at this</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043099#M1015186</link>
      <description>&lt;P&gt;It sounds like a bug at this point. Please do keep us updated with the TAC's findings.&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;
&lt;P&gt;- Marvin&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jul 2017 08:30:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043099#M1015186</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-07-04T08:30:36Z</dc:date>
    </item>
    <item>
      <title>You are right, I was doing a</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043100#M1015187</link>
      <description>&lt;P&gt;You are right, I was doing a lot of things at the same time and I replied to quickly.&lt;/P&gt;
&lt;P&gt;I agree with Marvin, it sounds like a bug.&lt;/P&gt;
&lt;P&gt;Since sometimes bugs are very funny, you can try to move rule 2 below rule 4 and see what happens.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jul 2017 10:19:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043100#M1015187</guid>
      <dc:creator>Massimo Baschieri</dc:creator>
      <dc:date>2017-07-04T10:19:05Z</dc:date>
    </item>
    <item>
      <title>We found out the EICAR is</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043101#M1015188</link>
      <description>&lt;P&gt;We found out the EICAR is detected via SMTP, when sent as a .txt file attachment. Which is good, the engine is "working".&lt;/P&gt;
&lt;P&gt;But if sent as an attachment in an executable file form of "eicar.com" (the way it was originally conceived as), or if inside a compressed file (with no password), it goes un-noticed by the AMP/FP engine. While the email client is smart enough to block certain file extensions, this can be disabled.&lt;/P&gt;
&lt;P&gt;More to come...&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jul 2017 22:47:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043101#M1015188</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2017-07-05T22:47:15Z</dc:date>
    </item>
    <item>
      <title>Ok, this ended in between a</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043102#M1015189</link>
      <description>&lt;P&gt;Ok, this ended in between a funny and sad resolution.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;TAC found out if you email the file (as text or compressed) using Mozilla Thunderbird client, AMP/FP detects the threat. If you use any other ways to send it (via web application connecting directly to your SMTP port or via other SMTP servers delivering a pre-made message), it passes thru. The email client and the desktop anti-virus picks up the threat inside the email message and blocks it. So "&lt;SPAN&gt;The problem is the way in which the page sends the email, the structure of the email.&lt;/SPAN&gt;" and "&lt;SPAN&gt;The Firepower is working properly."&lt;/SPAN&gt;, as they closed my case with such resolution.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;At the same time, other firewall products with similar threat detection features detects all kinds of files AMP/FP is missing, so I think we have our answer now.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks all for your time and suggestions. Now I need to make a reminder to malware makers to follow only standard rules when delivering malware so Cisco can catch them...&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jul 2017 19:55:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043102#M1015189</guid>
      <dc:creator>HQuest</dc:creator>
      <dc:date>2017-07-07T19:55:34Z</dc:date>
    </item>
    <item>
      <title>I agree that sounds like a</title>
      <link>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043103#M1015190</link>
      <description>&lt;P&gt;I agree that sounds like a pretty lame reply.&lt;/P&gt;
&lt;P&gt;If it were my case, I'd make note of it in the customer satisfaction survey they send after case closure.&lt;/P&gt;</description>
      <pubDate>Sat, 08 Jul 2017 11:25:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/smtp-attachment-analysis-on-firepower/m-p/3043103#M1015190</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-07-08T11:25:45Z</dc:date>
    </item>
  </channel>
</rss>

